Analysis

  • max time kernel
    114s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 21:08

General

  • Target

    bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70.exe

  • Size

    124KB

  • MD5

    0bd73745c902fa7858ce70bbf70faaa2

  • SHA1

    a3c3e89286e84e637f3fcb8743333b5abcbb2047

  • SHA256

    bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70

  • SHA512

    2ab758696ff85920d24420979c6eb7b41de60429fc25e1a4929612f126e764a8516301c861bca371f95a18aacd48bb6e68b508f2816de2033b150541549bac7b

  • SSDEEP

    1536:txefpXfsWZwtqC1UiHa5lY7oKb5eakEnAPJk0f9JT+z2L0f+1Rt2ZQSQPiyR/PVx:txefpUWWtqpQoKb5pSyc+z2LpLimXlGQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70.exe
    "C:\Users\Admin\AppData\Local\Temp\bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70.exe
      C:\Users\Admin\AppData\Local\Temp\bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Users\Admin\AppData\Roaming\Hkmdmk.exe
        "C:\Users\Admin\AppData\Roaming\Hkmdmk.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:276
        • C:\Users\Admin\AppData\Roaming\Hkmdmk.exe
          C:\Users\Admin\AppData\Roaming\Hkmdmk.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:588
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1888
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1704
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Hkmdmk.exe

    Filesize

    124KB

    MD5

    0bd73745c902fa7858ce70bbf70faaa2

    SHA1

    a3c3e89286e84e637f3fcb8743333b5abcbb2047

    SHA256

    bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70

    SHA512

    2ab758696ff85920d24420979c6eb7b41de60429fc25e1a4929612f126e764a8516301c861bca371f95a18aacd48bb6e68b508f2816de2033b150541549bac7b

  • C:\Users\Admin\AppData\Roaming\Hkmdmk.exe

    Filesize

    124KB

    MD5

    0bd73745c902fa7858ce70bbf70faaa2

    SHA1

    a3c3e89286e84e637f3fcb8743333b5abcbb2047

    SHA256

    bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70

    SHA512

    2ab758696ff85920d24420979c6eb7b41de60429fc25e1a4929612f126e764a8516301c861bca371f95a18aacd48bb6e68b508f2816de2033b150541549bac7b

  • C:\Users\Admin\AppData\Roaming\Hkmdmk.exe

    Filesize

    124KB

    MD5

    0bd73745c902fa7858ce70bbf70faaa2

    SHA1

    a3c3e89286e84e637f3fcb8743333b5abcbb2047

    SHA256

    bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70

    SHA512

    2ab758696ff85920d24420979c6eb7b41de60429fc25e1a4929612f126e764a8516301c861bca371f95a18aacd48bb6e68b508f2816de2033b150541549bac7b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BIEJ07L3.txt

    Filesize

    602B

    MD5

    62a9efbf7488d19d58b592edcaa7982c

    SHA1

    09ddf855f735d93f14af518dc284feae5eab870a

    SHA256

    4db9aa8b5a28be0bf77a2807f21a48b6cd9590943b0df79903f6bf341b85a64e

    SHA512

    35583333ed6693d728aca1282a6914bbfc1132387346394f9e85f7fe50847bdb901a113a917c60f5023c6b39bbd6884f9b1aef73234e9b611decdb5234b98419

  • \Users\Admin\AppData\Roaming\Hkmdmk.exe

    Filesize

    124KB

    MD5

    0bd73745c902fa7858ce70bbf70faaa2

    SHA1

    a3c3e89286e84e637f3fcb8743333b5abcbb2047

    SHA256

    bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70

    SHA512

    2ab758696ff85920d24420979c6eb7b41de60429fc25e1a4929612f126e764a8516301c861bca371f95a18aacd48bb6e68b508f2816de2033b150541549bac7b

  • \Users\Admin\AppData\Roaming\Hkmdmk.exe

    Filesize

    124KB

    MD5

    0bd73745c902fa7858ce70bbf70faaa2

    SHA1

    a3c3e89286e84e637f3fcb8743333b5abcbb2047

    SHA256

    bc15a6e54145c2769e5f2f151ff4f6b935bd70954b030181c1048c200425ae70

    SHA512

    2ab758696ff85920d24420979c6eb7b41de60429fc25e1a4929612f126e764a8516301c861bca371f95a18aacd48bb6e68b508f2816de2033b150541549bac7b

  • memory/276-72-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/276-67-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/276-64-0x0000000000000000-mapping.dmp

  • memory/588-77-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/588-76-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/588-70-0x000000000040B200-mapping.dmp

  • memory/952-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/952-66-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/952-61-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/952-59-0x00000000760E1000-0x00000000760E3000-memory.dmp

    Filesize

    8KB

  • memory/952-60-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/952-56-0x000000000040B200-mapping.dmp

  • memory/996-58-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/996-54-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB